• We just launched and are currently in beta. Join us as we build and grow the community.

Crosslinked – A LinkedIn Enumeration Tool

Kqck

Build Engineer
Divine
K Rep
0
0
0
Rep
0
K Vouches
0
0
0
Vouches
0
Posts
161
Likes
14
Bits
1 MONTH
1 1 MONTH OF SERVICE
LEVEL 1 500 XP
Black-and-Yellow-Workout-Exercise-YouTube-Thumbnail-.png


Hey Folks, we think we all know of a social media platform that is more used to business offers and jobs prospects named “Linkedin” and today we are going to tell you about the tool which is connected to it. CrossLinked is a LinkedIn enumeration tool that uses search engine scraping to collect valid employee names from a target organization. This technique provides accurate results without the use of API keys, credentials, or even accessing the site directly.

Let’s take a look 🙂 !!

Installation Crosslinked Tool

To established this tool, you only have to follow the instructions given below. First you’ll download this tool via the git command, decompress the folder, enter the decompressed directory, and execute the “pip” command to establish the rest requirements that the tool requires.

git clone https://github.com/m8r0wn/crosslinked
cd crosslinked/
pip3 install -r requirements.txt123git clone
https://github.com/m8r0wn/crosslinkedcd crosslinked/pip3 install-rrequirements.txt

1.png


Good 🙂 !! After successfully executing all the above commands you will be able to use this tool through the python utility.

python3 crosslinked.py -h1python3 crosslinked.py-h

2.png

How it’s Work ??

It uses the google dork in the backend to get anything useful data against any particular organization. In the results, it gives us the profile link and email address of those who are associated with or like that organization. Let’s show you 🙂 !! So only we have to give the name of the organization whose details we want to get and also mention the format for the email address. You can use the exact command below to rename the target accordingly.

python3 crosslinked.py -f '{first}.{last}@gmail.com' secnhack1python3 crosslinked.py-f'{first}.{last}@gmail.com'secnhack

3.png


Good 🙂 !! Once you execute the command it will give you several links which you can open one by one and check the user profile.

4.png


Hmm 🙂 !! Also, in the end a file named “names.txt” will be created by itself which will contain the email addresses of those users.

5.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

417,391

310,096

310,105

Top